- On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
Published in
Publisher
JMLR.org
Publication History
Published in Volume , Issue Issue: {object: doi:10.5555/1248547, revision: rev:1571679995883-67142:doi:10.5555/1248547, }Qualifiers
- issue
Article Metrics
- View Citations8,382Total Citations
- 62,149Total Downloads
- Downloads (Last 12 months)2,741
- Downloads (Last 6 weeks)324
Other Metrics
Comments